Sciweavers

2269 search results - page 417 / 454
» Behavioral Intrusion Detection
Sort
View
PR
2008
145views more  PR 2008»
13 years 9 months ago
Probabilistic suffix models for API sequence analysis of Windows XP applications
Given the pervasive nature of malicious mobile code (viruses, worms, etc.), developing statistical/structural models of code execution is of considerable importance. We investigat...
Geoffrey Mazeroff, Jens Gregor, Michael G. Thomaso...
SIGCSE
2008
ACM
138views Education» more  SIGCSE 2008»
13 years 9 months ago
Debugging: the good, the bad, and the quirky -- a qualitative analysis of novices' strategies
A qualitative analysis of debugging strategies of novice Java programmers is presented. The study involved 21 CS2 students from seven universities in the U.S. and U.K. Subjects &q...
Laurie Murphy, Gary Lewandowski, Renée McCa...
TKDE
2008
158views more  TKDE 2008»
13 years 9 months ago
Hierarchical Clustering of Time-Series Data Streams
This paper presents a time series whole clustering system that incrementally constructs a tree-like hierarchy of clusters, using a top-down strategy. The Online Divisive-Agglomera...
Pedro Pereira Rodrigues, João Gama, Jo&atil...
CAGD
2004
84views more  CAGD 2004»
13 years 9 months ago
Shape characterization of subdivision surfaces--case studies
For subdivision surfaces, it is important to characterize local shape near flat spots and points where the surface is not twice continuously differentiable. Applying general princ...
Kestutis Karciauskas, Jörg Peters, Ulrich Rei...
CORR
2004
Springer
191views Education» more  CORR 2004»
13 years 9 months ago
Artificial Intelligence and Systems Theory: Applied to Cooperative Robots
- This paper describes an approach to the design of a population of cooperative robots based on concepts borrowed from Systems Theory and Artificial Intelligence The research has b...
Pedro U. Lima, Luís M. M. Custódio